Now showing items 1-20 of 29

  • [2007-09-20] Anomaly detection for HTTP intrusion detection : algorithm comparisons and the effect of generalization on accuracy 

    Ingham, Kenneth III
    Network servers are vulnerable to attack, and this state of affairs shows no sign of abating. Therefore security measures to protect vulnerable software is an important part of keeping systems secure. Anomaly detection ...
  • [2009-01-29] A hierarchical group model for programming sensor networks 

    Horey, James
    A hierarchical group model that decouples computation from hardware can characterize and aid in the construction of sensor network software with minimal overhead. Future sensor network applications will move beyond static, ...
  • [2009-07-08] Distributed Internet security and measurement 

    Karlin, Josh
    The Internet has developed into an important economic, military, academic, and social resource. It is a complex network, comprised of tens of thousands of independently operated networks, called Autonomous Systems (ASes). ...
  • [2009-07-09] Improving the performance of parallel scientific applications using cache injection 

    Leon Borja, Edgar
    Cache injection is a viable technique to improve the performance of data-intensive parallel applications. This dissertation characterizes cache injection of incoming network data in terms of parallel application performance. ...
  • [2010-02-09] Using ant colony optimization for routing in microprocesors 

    Arora, Tamanna
    Power consumption is an important constraint on VLSI systems. With the advancement in technology, it is now possible to pack a large range of functionalities into VLSI devices. Hence it is important to find out ways to ...
  • [2010-02-09] Term rewriting with built-in numbers and collection data structures 

    Falke, Stephan
    Term rewrite systems have been extensively used in order to model computer programs for the purpose of formal verification. This is in particular true if the termination behavior of computer programs is investigated, and ...
  • [2010-02-09] Supervised manifold distance segmentation 

    Wang, Guanyu
    In this paper, I will propose a simple and robust method for image and volume data segmentation based on manifold distance metrics. In this approach, pixels in an image are not considered as points with color values arranged ...
  • [2010-02-09] Learning condition-specific networks 

    Roy, Sushmita
    Condition-specific cellular networks are networks of genes and proteins that describe functional interactions among genes occurring under different environmental conditions. These networks provide a systems-level view of ...
  • [2010-06-25] Programmer feedback and dynamic analysis to enable optimization in Java applications: the D.U.P.O. framework 

    Mohr, David
    It is inherently difficult for static analyses to make precise decisions about dynamic features of modern object-oriented languages. This makes it more difficult to apply optimizations aggressively. This thesis introduces ...
  • [2010-06-28] A protocol reconfiguration and optimization system for MPI 

    Gorentla Venkata, Manjunath
    Modern high performance computing (HPC) applications, for example adaptive mesh refinement and multi-physics codes, have dynamic communication characteristics which result in poor performance on current Message Passing ...
  • [2010-06-28] Collective belief models for representing consensus and divergence in communities of Bayesian decision-makers 

    Greene, Kshanti
    Bayesian belief aggregation is the process of forming a consensus model from the probabilistic beliefs of multiple individuals. Preference aggregation attempts to find an optimal solution for a population considering each ...
  • [2010-06-28] Efficient algorithms for phylogenetic post-analysis 

    Pattengale, Nicholas
    A variety of tasks are typically performed after a phylogenetic reconstruction proper -- tasks which fall under the category phylogenetic post-analysis. In this dissertation, we present novel approaches and efficient ...
  • [2010-06-28] Algorithms for self-healing networks 

    Trehan, Amitabh
    Many modern networks are reconfigurable, in the sense that the topology of the network can be changed by the nodes in the network. For example, peer-to-peer, wireless and ad-hoc networks are reconfigurable. More generally, ...
  • [2010-06-28] Markov random field modeling of the spatial distribution of proteins on cell membranes 

    Zhang, Jun
    Cell membranes display a range of receptors that bind ligands and activate signaling pathways. Signaling is characterized by dramatic changes in membrane molecular topography, including the co-clustering of receptors with ...
  • [2010-09-09] Dynamic photon painting 

    Chen, Zhe
    Photon-based radiosurgery is widely used for treating local and regional tumors. The key to improving the quality of radiosurgery is to increase the dose falloff rate from high dose regions inside the tumor to low dose ...
  • [2010-09-09] Security in network games 

    Navin, Rustagi
    Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2) increases in speed; and 3) increases in severity. Modern computer worms simply propagate too quickly for human detection. ...
  • [2010-09-09] Molecular simulations of dendritic molecules : a study of PAMAM and phenyl-acetylene dendrimers 

    Fleharty, Mark
    Dendrimers are branched molecules that often have chemical properties similar to proteins and other large organic molecules. Dendrimers presently have applications as reactive surfaces for catalysis, and as hosts for ...
  • [2011-02-08] Simulating the evolution of recruitment behavior in foraging Ants 

    Letendre, Kenneth
    Spatial heterogeneity in the distribution of food is an important determinant of species' optimal foraging strategies, and of the dynamics of populations and communities. In order to explore the interaction of food ...
  • [2011-02-09] Three algorithms for causal learning 

    Rammohan, Roshan Ram
    The field of causal learning has grown in the past decade, establishing itself as a major focus in artificial intelligence research. Traditionally, approaches to causal learning are split into two areas. One area involves ...
  • [2011-08-30] Improving peer review with ACORN : Ant Colony Optimization algorithm for Reviewer's Network 

    Flynn, Mark
    Peer review, our current system for determining which papers to accept and which to reject by journals and conferences, has limitations that impair the quality of scientific communication. Under the current system, reviewers ...